Remove Authentication Remove Firewall Remove Mobile Remove Security Defenses
article thumbnail

What Is DNS Security? Everything You Need to Know

eSecurity Planet

The DNS protocol was designed for use within a firewall on a secure network, and by default will communicate in plain text. A modern computing environment includes branch offices, remote workers, and mobile devices that must reach DNS servers from outside the firewall. What Are DNS Security Extensions (DNSSEC)?

DNS 94
article thumbnail

VulnRecap 1/22/24 – Watch Chrome, Ivanti, Citrix Issues

eSecurity Planet

Citrix and Ivanti are seeing more problems, too, as more vulnerabilities have cropped up in Netscaler and Endpoint Manager Mobile. Make sure your security teams are regularly checking vendors’ software and hardware updates for any patches, and keep a particular eye on networking equipment. EPMM versions 11.10, 11.9 are affected.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

August 21, 2023 Ivanti finds another vulnerability For the third time in a month, Ivanti’s has reported a vulnerability in a mobile device management platform. The latest — CVE-2023-38035 — affects the Sentry secure mobile gateway, part of Ivanti’s UEM platform and is being exploited as a zero-day.

VPN 87
article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

August 21, 2023 Ivanti finds another vulnerability For the third time in a month, Ivanti’s has reported a vulnerability in a mobile device management platform. The latest — CVE-2023-38035 — affects the Sentry secure mobile gateway, part of Ivanti’s UEM platform and is being exploited as a zero-day.

VPN 70
article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Ponemon chairman and founder Larry Ponemon said in a statement that “Most of the IT and security professionals regard their organizations as vulnerable to these attacks,” and that growing adoption of technologies such as cloud, mobile , big data , and the Internet of Things (IoT) are adding to that risk.

article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

A host-based firewall is installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data. Its goal is to establish a uniform security posture throughout the network and improve endpoint security by creating a protective barrier at the individual computer level.

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

While the infotainment system is supposedly firewalled from steering, throttling, and braking, attached devices may not be fully secured against communication via Wi-Fi. Mobile devices connected to the automobile infotainment system may be exposed to RCE attacks seeking to access the device or use it to attack connected networks.